Requirements for scalable access control and security management architectures

被引:19
作者
Keromytis, Angelos D. [1 ]
Smith, Jonathan M. [2 ]
机构
[1] Columbia Univ, Dept Comp Sci, New York, NY 10027 USA
[2] Univ Penn, Dept Informat & Comp Sci, Philadelphia, PA 19104 USA
关键词
security; design; management; large-scale systems; distributed systems; authorization; credentials; delegation; security policy; access control; trust management;
D O I
10.1145/1239971.1239972
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Maximizing local autonomy by delegating functionality to end nodes when possible (the end-to-end design principle) has led to a scalable Internet. Scalability and the capacity for distributed control have unfortunately not extended well to resource access-control policies and mechanisms. Yet management of security is becoming an increasingly challenging problem in no small part due to scaling up of measures such as number of users, protocols, applications, network elements, topological constraints, and functionality expectations. In this article, we discuss scalability challenges for traditional access-control mechanisms at the architectural level and present a set of fundamental requirements for authorization services in large-scale networks. We show why existing mechanisms fail to meet these requirements and investigate the current design options for a scalable access-control architecture. We argue that the key design options to achieve scalability are the choice of the representation of access control policy, the distribution mechanism for policy, and the choice of the access-rights revocation scheme. Although these ideas have been considered in the past, current access-control systems in use continue to use simpler but restrictive architectural models. With this article, we hope to influence the design of future access-control systems towards more decentralized and scalable mechanisms.
引用
收藏
页数:22
相关论文
共 37 条
[1]  
BARTAL Y, 1999, P 1999 IEEE S SEC PR
[2]  
BELLOVIN SM, 1999, LOGIN USENIX MAGAZIN
[3]  
Bhatti R., 2005, ACM Transactions on Information and Systems Security, V8, P187, DOI 10.1145/1065545.1065547
[4]  
Bonatti P., 2000, CCS 00, P164
[5]  
BOYLE J, 2000, COPS COMMON OPEN POL
[6]  
BULL JA, 1992, LECT NOTES COMPUT SC, V648, P3
[7]  
CALHOUN P, 1999, DIAMETER BASE PROTOC
[8]  
CHINITZ J, 1996, TRANSPARENT SECURITY
[9]  
CLARK DD, 1988, P ACM SIGCOMM 88 STA, P106
[10]  
DAMIANOU M, 2002, THESIS U LONDON